APC Fundamental Principles of Network Security
APC Fundamental Principles of Network Security
APC Fundamental Principles of Network Security
of Network Security
By Christopher Leidigh
Executive Summary
Security incidents are rising at an alarming rate every year. As the complexity of the threats
increases, so do the security measures required to protect networks.
Data center
operators, network administrators, and other data center professionals need to comprehend
the basics of security in order to safely deploy and manage networks today. This paper
covers the fundamentals of secure networking systems, including firewalls, network
topology and secure protocols. Best practices are also given that introduce the reader to
some of the more critical aspects of securing a network.
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
Introduction
Securing the modern business network and IT infrastructure demands an end-to-end approach and a firm
grasp of vulnerabilities and associated protective measures. While such knowledge cannot thwart all
attempts at network incursion or system attack, it can empower network engineers to eliminate certain
general problems, greatly reduce potential damages, and quickly detect breaches. With the ever-increasing
number and complexity of attacks, vigilant approaches to security in both large and small enterprises are a
must. Figure 1 illustrates the steep rise in security incidents occurring each year, as reported to the CERT
Coordination Center (a center of Internet security expertise).
85,000
82,094
80,000
75,000
70,000
65,000
60,000
55,100
55,000
50,000
45,000
40,000
35,000
30,000
25,000
21,756
20,000
15,000
9,859
10,000
5,000
2,340
1995
2,412
1996
2,573
1997
2,134
1998
3,734
1999
2000
2001
2002
2003
Year
1998-2003 by Carnegie Mellon University
This paper presents security fundamentals as well as some best practices regarding the network, computer
hosts and infrastructure network elements. Since there is no such thing as the only way to approach
security, it is left up to the reader / implementer to best judge what measures are appropriate.
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
then the systems that are protected by these secrets can be compromised. It may seem like a terribly
obvious statement, but most systems are compromised in very basic ways. Leaving a Post-It note with a
system password stuck to the side of a computer monitor may seem foolish, but many people in fact do such
things. Another example, which is only slightly less obvious, is the tendency to leave factory default
passwords in certain network devices. One such device might be a network management interface to a
UPS. UPS systems, whether small in capacity or large enough to power 100 servers, are often overlooked
in a security scheme. If such devices are left with default usernames and passwords, it could just be a
matter of time before someone gains access knowing nothing more than the device type and its published
default credentials. Imagine a server bank with rock solid security protocols on each web and mail server
crashed by a simple power cycle on an unprotected UPS!
Security Basics
Knowing the network
It is not possible to protect anything unless one clearly understands WHAT one wants to protect.
Organizations of any size should have a set of documented resources, assets and systems. Each of these
elements should have a relative value assigned in some manner as to their importance to the organization.
Examples of things that should be considered are servers, workstations, storage systems, routers, switches,
hubs, network and Telco links, and any other network elements such as printers, UPS systems and HVAC
systems. Other important aspects of this task include documenting equipment location and any notes on
dependencies. For instance most computers will rely on power backup systems such as UPSs which
themselves may be part of the network if they are managed. Environmental equipment such as HVAC units
and air purifiers may also be present.
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
External origination,
internal use
Network virus
External
Internal browsing to
external site
Denial of service
attack
External
Internal to anywhere
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
smaller companies and homes getting full time Internet connectivity. Partitioning the boundary between the
outside Internet and the internal intranet is a critical security piece. Sometimes the inside is referred to as
the trusted side and the external Internet as the un-trusted side. As a generality this is all right, however,
as will be described, this is not specific enough.
A firewall is a mechanism by which a controlled barrier is used to control network traffic into AND out of an
organizational intranet. Firewalls are basically application specific routers. They run on dedicated
embedded systems such as an internet appliance or they can be software programs running on a general
server platform. In most cases these systems will have two network interfaces, one for the external network
such as the Internet and one for the internal intranet side. The firewall process can tightly control what is
allowed to traverse from one side to the other. Firewalls can range from being fairly simple to very complex.
As with most aspects of security, deciding what type of firewall to use will depend upon factors such as traffic
levels, services needing protection and the complexity of rules required. The greater the number of services
that must be able to traverse the firewall the more complex the requirement becomes. The difficulty for
firewalls is distinguishing between legitimate and illegitimate traffic.
What do firewalls protect against and what protection do they not provide? Firewalls are like a lot of things; if
configured correctly they can be a reasonable form of protection from external threats including some denial
of service (DOS) attacks. If not configured correctly they can be major security holes in an organization.
The most basic protection a firewall provides is the ability to block network traffic to certain destinations.
This includes both IP addresses and particular network service ports. A site that wishes to provide external
access to a web server can restrict all traffic to port 80 (the standard http port). Usually this restriction will
only be applied for traffic originating from the un-trusted side. Traffic from the trusted side is not restricted.
All other traffic such as mail traffic, ftp, snmp, etc. would not be allowed across the firewall and into the
intranet. An example of a simple firewall is shown in Figure 2.
Internet
Firewall
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
An even simpler case is a firewall often used by people with home or small business cable or DSL routers.
Typically these firewalls are setup to restrict ALL external access and only allow services originating from the
inside. A careful reader might realize that in neither of these cases is the firewall actually blocking all traffic
from the outside. If that were the case how could one surf the web and retrieve web pages? What the
firewall is doing is restricting connection requests from the outside. In the first case all connection requests
from the inside are passed to the outside as well as all subsequent data transfer on that connection. From
the exterior, only a connection request to the web server is allowed to complete and pass data, all others are
blocked. The second case is more stringent as connections can only be made from the interior to the
exterior.
More complex firewall rules can utilize what is called stateful inspection techniques. This approach adds to
the basic port blocking approach by looking at traffic behaviors and sequences to detect spoof attacks and
denial of service attacks. The more complex the rules, the greater the computing power of the firewall
required.
One problem most organizations face is how to enable legitimate access to public services such as web,
ftp and e-mail while maintaining tight security of the intranet. The typical approach is to form what is known
as a DMZ (demilitarized zone), a euphemism from the cold war applied to the network. In this architecture
there are two firewalls: one between the external network and the DMZ, and another between the DMZ and
the internal network. All public servers are placed in the DMZ. With this setup, it is possible to have firewall
rules which allow public access to the public servers but the interior firewall can restrict all incoming
connections. By having the DMZ, the public servers are still provided more protection than if they were just
placed outside a single firewall site. Figure 3 illustrates the use of a DMZ.
DMZ
Internet
Internal
Firewall
Firewall
FTP Server
Using internal firewalls at various intranet boundaries can also help limit damage from internal threats and
things like worms that have managed to traverse the border firewalls. These can even be run in standby so
that normal traffic patterns are not blocked, but tight rules turned on in a problem situation.
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
Workstation firewalls
There is an important network security factor that most people are only now becoming aware of and that is
that EVERY node or workstation on a network could be a potential security hole. In the past, basic attention
was paid to firewalls and servers, however, with the advent of the web and the proliferation of new classes of
nodes such as internet appliances, there are several more dimensions to protecting networks. A variety of
worm virus programs hijack computers and use them to both further spread themselves as well as
sometimes harm systems. Many of these worms would be stopped or greatly hindered if organizations had
internal systems more locked down. Workstation firewall products can block all port accesses into and out
of individual hosts that are not part of the normal needs of the host. Additionally firewall rules on the
INTERNAL side that block suspicious connections out of the organization can help prevent worms spreading
back out of an organization. Between the two, both internal and external replication can be reduced. For the
most part, all systems should be able to block all ports that are not required for use.
Do not use obvious passwords such as spouses name, favorite sports team, etc.
2.
3.
4.
Unless computers or equipment have built in policies that can enforce the above concepts, these are rules
that must be self enforced. Rule (4) can at least be tested for by having network probes that try to detect
equipment with default credentials.
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
Features
Protocol Uses
Username \ Password
Telnet, HTTP
CHAP
(Challenge Handshake
Authentication Protocol)
RADIUS
TACACS+
Authentication, Authorization,
Accounting, full encryption support
Kerberos
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
Restricting access to devices is one of the most important aspects of securing a network. Since
infrastructure devices are supporting both the network and computing equipment ipso facto, compromising
these can potentially bring down an entire network and its resources. Paradoxically, many IT departments
go through great pains to protect servers, institute firewalls and secure access mechanisms, but leave some
basic devices with rudimentary security.
At a minimum, all devices should have username password authentication with non-trivial (10 character,
mixed alpha, numbers and symbols). Users should be restricted in both numbers and type of authorization.
Care should be taken when using remote access methods that are not secure, i.e. usernames and
passwords passed in the clear over the network. Passwords should also be changed with some reasonable
frequency, perhaps every three months and when employees leave, if group passwords are used.
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
10
Active
Directory
DC
Database
Login
Response
Radius
Client
User
Login
Request
Authentication
Response
Device
CUPS /
Management Card
IAS /
Radius
Radius
Authentication
Request
11
similar to a CRC (cyclic redundant check) on a disk file to detect data alteration. The hashes are used as a
data authentication method (different than user authentication). Anyone trying to secretly alter data in transit
across a network will alter the hash values thus causing detection. Table 3 provides a basic comparison of
cryptographic algorithms and their uses.
Primary Use
Protocol Uses
DES
Encryption
3DES
Encryption
RC4
Encryption
SSL/TLS
Blowfish
Encryption
SSH
AES
Encryption
SSH, SSL/TLS
MD5
SHA
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
12
All network hosts lock down unneeded network ports, turn off unneeded services
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
13
Centrally managed user management with password policy (i.e. must change every three months
and must be secure password
The above list represents the key items one should have in a policy. There are potentially other wide
reaching items one could have in a policy. Of course, its always important to balance factors such as
company size, risk analysis, cost and business impact when determining the type and breadth of a policy.
As mentioned above, a system analysis is typically a good starting point, followed by the business analysis.
While not obvious even very small companies should have some form of security policy, since all networks
can be targets regardless of their size.
Conclusions
With the increased number of threats to networks such as worms, viruses and clever hackers, security can
no longer be viewed as an option, even within private networks. Securing all equipment, including physical
infrastructure equipment such as UPS systems and HVAC systems, is critical to maintaining uptime and
seamless access to services. Providing and maintaining security across the enterprise typically means
increased administration. Historically, this has been the largest barrier to broad implementations of security.
Today, the amount of time spent repairing a network due to just a single worm or virus attack can easily be
greater than the upfront time to more adequately secure an enterprise. Fortunately, there are many options
in systems and software to increase the security of the network while reducing the overhead of managing
such systems. Even basic practices such as periodic software updates, locking down all devices and using
centralized authentication and secure access methods can go a long way to reducing risks. Institution of
appropriate security policies and frequent network audits further increase the overall protection of the
network.
2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or
stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com
Rev 2005-0
14